Sciweavers

5511 search results - page 207 / 1103
» Security for Network Places
Sort
View
ONDM
2007
15 years 5 months ago
Securing Passive Optical Networks Against Signal Injection Attacks
Passive optical access networks are susceptible to intended attacks and unintended failures. This paper discusses intrusion by user-side signalinjection resulting in reduced networ...
Harald Rohde, Dominic A. Schupke
JSAC
2006
167views more  JSAC 2006»
15 years 4 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
151
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
129
Voted
IPTPS
2004
Springer
15 years 9 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières
IICS
2001
Springer
15 years 8 months ago
Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage ...
Igor Sedov, Marc Haase, Clemens H. Cap, Dirk Timme...